Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user’s actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing t...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
Abstract: When users insert their passwords in a common area, they might be at risk of aggressor ste...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Graphical passwords are a method of authentication in computer security. Computer security is one of...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Typing passwords is vulnerable to shoulder-surfing attacks. We proposed a shoulder-surfing resistant...
The main objective of this research is to propose, develop and analyse a new recognition based authe...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
To improve security of mobile device graphical password towards shoulder surfing attack, an anti-sho...
Abstract- Shoulder surfing is biggest problem faced by security system nowadays. The attacker observ...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
Abstract: When users insert their passwords in a common area, they might be at risk of aggressor ste...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Over the years, various picture-based password systems were proposed to exploit the utility of pict...
Traditional passwords are difficult to remember and vulnerable to shoulder-surfing attacks. A graphi...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...
Graphical passwords are a method of authentication in computer security. Computer security is one of...
Graphical passwords are often considered prone to shoulder-surfing attacks, where attackers can stea...
Abstract—Researchers have been trying to improve authentication for a long time. User still uses tex...
Abstract: Authentication is a procedure that checks for validity and may be carried out in a variety...
Typing passwords is vulnerable to shoulder-surfing attacks. We proposed a shoulder-surfing resistant...
The main objective of this research is to propose, develop and analyse a new recognition based authe...
In order to prevent intruders from looking into sensitive data in smartphones users will have their ...
To improve security of mobile device graphical password towards shoulder surfing attack, an anti-sho...
Abstract- Shoulder surfing is biggest problem faced by security system nowadays. The attacker observ...
Shoulder-surfing is a known risk where an attacker can capture a password by direct observation or b...
Abstract: When users insert their passwords in a common area, they might be at risk of aggressor ste...
Picture-based password has been proposed as an alternative authentication method to replace text-bas...